Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second situation. You are a user of Web Money or similar.
To perform actions with your wallets you need to connect to the system. What can happen during such connections? Continue reading
At this stage of the development of the Internet, the blogosphere is of serious interest from the business. Thus, the value of one unit of the blogosphere, that is, the blog, increases. It becomes an effective tool for promoting the advertiser’s products or services. This promotion is called social marketing. Continue reading
7 “hard” examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The days when the Internet was poorly distributed and was rather a haven of “freaks” and geeks passed. Together with the mass character of the Network, numerous and really serious problems began to appear. And it is not surprising that entire states are thinking about regulating the Network not only on their territory. Continue reading